Home CV/Resume Books Litigation Support Contact Teaching  

This segment of the website is to provide a list of research papers that reference my work, his own research papers, and other information regarding places where my work has had some impact.

My books and articles have been referenced by numerous computer scientists, including several Ph.D. dissertations.  A few of those references are included here:

1. An assessment of user response to phishing attacks: the effects of fear and self-confidence by Deanna House, Ph.D. Dissertation in Information Systems, University of Texas Arlington.
2. Assessment of Users' Information Security Behavior in Smartphone Networks- Ph.D disseration of Mohammadjafar Esmaeili Eastern Michigan University.
3. A cryptographically-based operating system security model that protects against privileged attackers. By Christian Pain Ph.D. Dissertation Murdoch University School of Information Technology
4. Reference Model Based High Fidelity Simulation Modeling For Manufacturing Systems by Hansoo Kim Ph.D. Dissertation, School of Industrial and Systems Engineering Georgia Institute of Technology.
5. Leadership Styles and Information Security in Small Businesses: An Empirical Investigation by Debasis Bhattachary, Ph.D. Dissertation, University of Phoenix.
6. The adoption of business-to-business systems by small and medium enterprises in Amman and the perceptions of its influence on performance and efficiency by Anals A. AlBakry, Ph.D. Dissertation, University of Southern Queensland.
7. Models, Services and Security In Modern Online Social Networks, Ph.D. dissertation of Alessio Bonti Deakin University, Australia.
8. Design of a Forensic Overlay Model for Application Development Linlin Ke, Master’s Thesis, College of Engineering, University of Canterbury.
9. Forensic Analysis of Linux Physical Memory: Extraction and Resumption of Running Processes. ED Mougoue, Master’s Thesis, James Madison University.
10. Motivations behind Software Piracy: From the viewpoint of Computer Ethics Theories. Bethelhem Tadele, Masters Thesis University of Oulu (Scandinavia).
11. Securing CAN Bus Communication: An Analysis of Cryptographic Approaches by Jennifer Ann Bruton. Masters Thesis National University of Ireland, Galway
12. Hackers, spies, and stolen secrets: protecting law firms from data theft by Alan W. Ezekiel. Harvard Journal of Law & Technology Volume 26, Number 2 Spring 2013Taming the diversity of information assurance & security - Journal of Computing Sciences in Colleges Volume 23, Issue 4 (April 2008) J. Paul Myers, Sandra Riela.
13. Adding information assurance to the curriculum - Journal of Computing Sciences in Colleges Volume 22, Issue 2 (December 2006) Richard Weiss.
14. Effect of Windows XP Firewall on Network Issues in Informing Science and Information Technology Volume 4, 2007 Al-Rawi(King Faisal University Saudi Arabia) ,Lansari (Zayed University UAE).
15. Assessing Risks of Policies to Patch Software Vulnerabilities Radianti, Sveen, and Gonzalez.
16. A study of efficient avoidance in the event of DNS(domain name system) failure - Proceedings of the 8thConference on 8th WSEAS International Conference on Automation and Information - Volume 8 Lin, Hwang, Lin.
17. Embracing the Diversity of Information Assurance & Security - Myers
18. A study of efficient avoidance in the event of DNS (domain name system) failure -Yang, Hyon, and Hankyu.
19. Social and Organizational Aspects of Information Security Management -K. Michael.
20. The Problems and Policy Alternatives for Cyber Security in the Networking Age by Lee Ki Shik.
21. Securing Small Business: - The Role of Information Technology Policy. Batten and Castleman.
22. The Impact of Virtual Private Network (VPN) on a Company's Network. Powell, J.M.
23. Thinking Globally: Incorporating an International Component in Information Security Curricula. Kiswani and Al-Bakari.
24. Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security White and Long.
25. The Expanded Risk Horizon of Accounting Networks Utilizing Wireless Technology - David R. Fordham -AIS Educator Journal Volume: 4 Issue: 1 2009.
26. Researches on the IPv6 Network safeguard linked system - Ma Yue, Lian Hong, and Zhang Xiao Feng- Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference 2010.
27. Migration from Microsoft to Linux on Servers and Desktops. –Kumar.
28. Decision making process in migration from Microsoft to Linux –Kumar.
29. Automatic Generation of Intelligent JavaScript Programs for Handling Input Forms in HTML Documents Suzuki and Tokuda Dept. of Comp. Science, Tokyo Inst. of Tech.
30. Influence of copyrights over the relationships in elearning Ivan Pogarcic, Marko Pogarcic, Matej Pogarcic Polytechnic of Rijeka, University of Rijeka, Faculty of Law, University of Ljubljana.
31. Using Whois Based Geolocation and Google Maps API for support cybercrime investigations, Asmir Butkovic et. al.
32. Odyssey of Data Security With A New Perception. Ankita & Lavisha
33. Cyber Law: Approach to Prevent Cyber Crime. M Verma, SA Hussain, SS Kushwah.
34. The Internet-EDI Systems Adoption by Enterprises in Jordan: Descriptive Analysis of Adoption, Strategies and Benefits by Anas Al Bakri International Journal of Internet and Distributed Systems.
35. Encryption Protocol using some Pieces of Message as Key by S. Prakancharoen - International Journal of Applied Computer Technology.
36. A Patient Privacy Protection Scheme for Medical Information System by by Lu, Wu, Liu, Chen, and Guo. Journal of Medical Systems October 2013.
37. A study of information security awareness and practices in Saudi Arabia by Alarifi, A.; SISAT, Univ. of Wollongong, Wollongong, NSW, Australia. doi: 10.1109/ICCITechnol.2012.6285845.
38. Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS by Sediyono, E.; Satya Wacana Christian Univ., Salatiga, Indonesia; Santoso, K.I. ; Suhartono. doi: 10.1109/ICACCI.2013.6637420.
39. Design and Implementation of a Virtual Calculation Centre (VCC) for Engineering Students, by Alaeddine. Published in International Journal of Online Engineering. 2010, Vol. 6 Issue 1, p18-23.
40. Artificial Intelligence Tool and Electronic Systems Used to Develop Optical Applications, By Tecpoyotl-Torres et. al. Chapter 10 in the book Advances in Lasers and Electro Optics.
41. The entry on ‘computer crime and security’ in the Encyclopedia of Computer Science and Technology cites my Computer Security Fundamentals textbook.
42. University of British Columbia Law Review "In Plain View R V Jones and the Challenge of Protecting Privacy in an era of computer search"
43. "Researches on the IPv6 Network safeguard linked system" Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Volume:7 ).
44. The Criminalization of Identity Theft under the Saudi Anti-Cybercrime Law 2007 Journal of International Commercial Law and Technology vol 9, no2 by Suhail Almerdas.
45. An Optimized and Secured VPN with Web Service Networking and Communication Engineering vol 6, No2; by A. Balasubramanian, A. Hemanth Kumar, R. Prasanna Venkatesan.
46. Factors Affecting The Implementation Of Management Information System In Selected Financial Cooperatives In Nairobi. Published in the International Journal of Social Sciences and Project Planning Management, Vol 1, Issue 2, 2014.
47. A New Classification Scheme for Intrusion Detection Systems by Bilal Beigh published in the International Journal of Computer Network and Information Security vol 6, No. 8, July 2014.
48. Santoso, E. (2014, June). The Role of Biometrics Technology To Support E-Governance In Public And Business Administration. International Scientific Conference “e-governance”
49. Mughal, S. (2014) Counter Measures to Mitigate Cyberstalking Risks: A Value Focused Multiple Criteria Approach.
50. Dragan, A. (2014). Hacking and Computer Crimes Computer Fraud - A Comparative Look at the New Criminal Code and the Criminal Code of the Republic of Moldova. AGORA International Journal of Juridical Sciences No. 1, pp 29-34.
51. Ramakic, A. Bundalao, Z. (2014). Data Protection in Microcomputer Systems And Networks. Acta Tehnica Corviniensis – Bulletin of Engineering (University of Bosnia and Herzegovina)

    Universities using my books

    A number of colleges and universities around the world have used, or are using one or more of my books as textbooks.  Below is an exemplary sample of some of those universities.

    1. Auburn University
    2. University of Texas at Dallas
    3. University Of Oklahoma
    4. Arizona Western College
    5. Kent State University Ohio
    6. Pennsylvania State University
    7. University Of Nebraska
    8. University of North Dakota
    9. Illinois State University
    10. Western Illinois University
    11. University Of South Carolina
    12. University of Wyoming
    13. Florida State University
    14. East Tennessee State University
    15. The Citadel
    16. University Of The Incarnate Word
    17. Midwestern State University
    18. University Of S Carolina-Lancaster
    19. Southeast Missouri State University
    20. George Mason University
    21. Queen’s College New York
    22. American Military University
    23. Columbus State University
    24. Texas Christian University
    25. Liberty University
    26. Illinois Institute of Technology
    27. Rochester Institute of Technology
    28. Wentworth Institute of Technology
    29. Western Nevada College
    30. Eastern Florida State College
    31. Florida State College
    32. College Of So Nevada-Cheyenne
    33. College Of S Nevada-W Charleston
    34. University of Dhaka (Bangladesh)
    35. Kurukshetra University (India)
    36. Universiti Malaysia Sarawak (Malaysia)
    37. Trinity College of Puerto Rico
    38. Technological Institute of the Phillipines
    39. Nigeria University


    In addition some of my books have been translated into additional languages including German, Korean, and Mandarin.


    Media References

    My computer science expertise has been sought out by reporters including:
    • CNN Money interviewed me regarding alleged unbreakable cryptography http://money.cnn.com/2011/09/02/technology/unhackable_code/
    • CBS SmartPlanet interviewed me regarding NSA and cryptography http://www.smartplanet.com/blog/bulletin/nsa-proof-products-protective-or-a-profit-motive/
    • E-Books directory lists my “Moving from Windows to Linux” book as one of the top 10 Linux books http://www.e-booksdirectory.com/linux/top10.html.
    • Lawrence Journal World interviewed me for a hacking story that was published August 6, 2006. The article was entitled "Hackers infiltrate Web site".